fencingforum.com

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Elon Musk and Tesla found not liable in lawsuit over “funding secured” tweet

    February 4, 2023

    TikTok opens transparency center as it faces new threats of government ban

    February 2, 2023

    Boeing to retire 747 as NASA invests in sustainable aircraft design

    February 2, 2023
    Facebook Twitter Instagram
    fencingforum.com
    • Home
    • News

      Elon Musk and Tesla found not liable in lawsuit over “funding secured” tweet

      February 4, 2023

      TikTok opens transparency center as it faces new threats of government ban

      February 2, 2023

      Boeing to retire 747 as NASA invests in sustainable aircraft design

      February 2, 2023

      FTC tracks GoodRx to sell user health data

      February 1, 2023

      ChatGPT, OpenAI, Napster: AI is the future, so is litigation

      February 1, 2023
    • Crypto

      2022 Will Be Biggest Year Ever For Cryptocurrency Hacking, Report Says

      February 1, 2023

      Massachusetts Provident Solves Past Crypto Problems

      February 1, 2023

      Chiron Investigation Saves The Crypto Community With Unique Recovery Service

      February 1, 2023

      Cryptocurrency Exchange Gets Favorable Judgment In Arbitration Of Claim For Alleged Trading Loss | Proskauer – Blockchain & Law

      February 1, 2023

      Illinois Crypto Investors Share $45 Million Settlement

      February 1, 2023
    • Startup

      Proptech Startup Appoints Braves Following Competitive Pitch Today

      February 2, 2023

      Mental health startups form a union.Additionally, the Covid emergency ending in May

      February 2, 2023

      Web development startup Netlify acquires rival Gatsby

      February 2, 2023

      PitchBlack, the startup competition for black entrepreneurs, returns with a new venue

      February 2, 2023

      Meet the eight companies that make up StarTUp in The Armory’s first winter cohort

      February 1, 2023
    • Technology

      Gorilla Technology Group Appoints Lawrence Ng as Head of Asia

      February 1, 2023

      Tom Hanks, Robert Zemeckis’ new movie will use deepfake AI technology

      February 1, 2023

      See the achievements of Iran’s space technology

      February 1, 2023

      Advanced material market for nuclear fusion technology

      February 1, 2023

      12 Information Technology Stocks to Move in Wednesday’s Intraday Session

      February 1, 2023
    • Trending

      New Orleans mayor says violent crime trend is ‘encouraging’

      February 1, 2023

      Timberwolves basketball boss says Karl-Anthony Towns is ‘moving in a really positive direction’ – Twin Cities

      February 1, 2023

      What are the trends in nutrition? value, value, value.

      February 1, 2023

      Why is ‘Andrea Riseborough’s Oscar controversy’ a trend?

      February 1, 2023

      Mushrooms will continue to be a trend food in 2023 – Produce Blue Book

      February 1, 2023
    Facebook Twitter Instagram
    fencingforum.com
    Home»Technology»API Security in Operational Technology (OT)
    Technology

    API Security in Operational Technology (OT)

    admin1By admin1January 19, 20236 Mins Read
    Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Operational technologies include Supervisory Control and Data Acquisition (SCADA), Industrial Control Systems (ICS), and Distributed Control Systems (DCS). OT can be involved in critical processes and, if compromised, can have devastating consequences, including loss of life. Water treatment plants, power distribution, traffic management, and other critical infrastructure rely on well-functioning operational technology solutions.

    The increase in OT devices used in these industries and others such as healthcare and life sciences makes cybersecurity more important. According to Gartner, Over 80% of organizations have implemented OT technology, and 20% have detected an OT-related security attack within the last three years. According to the 2019 Ponemon Cyber ​​Security in Operational Technology Report: 60% of respondents express concern about attacks against OT.

    Operational technology security challenges

    Outside of B2B and B2C software, APIs are frequently used in OT, acting as the glue for communicating specialized data descriptions such as vibration and pressure between equipment and control software. For example, in an OT scenario, a predictive maintenance application running on factory floor equipment as part of a SCADA system might open a secure HTTPS connection to a server and request motor runtime data. Using the API, the factory equipment knows exactly how to connect to the server, retrieve the list of available data resources, and read and write values ​​for those resources. The server returns motor uptime and an indication of the next preventative maintenance schedule to the predictive maintenance application. Therefore, misuse of the APIs involved in these communications can result in data theft or disruption.

    The OT security challenge doesn’t really arise with disconnected or air-gapped systems, but when everything becomes available on the public internet. The playing field for attackers becomes more interesting and sophisticated as more facilities become interdependent as part of the overall manufacturing process. Unfortunately, there is a lot of documentation, public Python libraries, and online tools that attackers can quickly become familiar with.

    Not all of these systems are manufacturing focused. Power generation, utilities, transportation, and logistics companies utilize similar systems and similar methods. The basics are devices that communicate, collect data, make decisions, take action, and allow humans to change. Often these systems feed each other through an overall SaaS-based “director” that can tie together many such systems. Since production often requires fine-tuning, there are many different places where human-machine interface (HMI) points reside. These can be as simple as a button for adding a little ingredient, or as sophisticated as the primary director for the entire system.

    Each point along the system can be attacked. Similar to attacks seen against web applications and APIs, attacks on the central point of the human interface are probably the most impactful. Looking at the web display, is that tank really still full? What if it’s a necessary ingredient in the production process and something breaks when that ingredient is gone? An entire batch can fail in QA. Communication signals of this kind can be interrupted, altered or even manipulated if not properly protected.

    Apply the OWASP API Security Top 10 to your operational technology

    When looking to improve operational technology and other types of controlled environments involved in SCADA systems, more and more communications are standard TCP/IP, no longer proprietary protocols, but standard HTTP API channels. Use the. The combination of rapid development and adoption of older technologies that were not designed with security in mind can lead to serious problems in this kind of environment. Many of these systems weren’t built all at once and often incorporate older technology. As we’ve seen in previous SCADA research, credential reuse happens all the time in factories, and many of these systems have a root or administrator weakness. The password is the same for all systems installed by the same company.

    The CQ Prime Threat Research Team recently API Security Unholy Trinity Attackers used multiple OWASP API Security Top 10 exploits to achieve their malicious end goal. The same threats apply in the OT world.

    • Improper Authentication (OWASP API 2): This flaw allows access or granted credential stuffing. When applied to OT, authentication is critical and should not be shared credentials.
    • Excessive data exposure (OWASP API 3): APIs that communicate data that should not be transferred often leak data through standard http response analysis. The OT world may have assumed that communications would never be exposed, so masking and encryption weren’t considered.
    • Finally, we’re seeing that many of the API endpoints in use, known as Poor Asset Management (OWASP API 9), are not well known to organizations. These are 3rd Party APIs, SCADA or DCS APIs exposed outside of a documented process have little or no oversight.

    These aren’t the only API flaws that are exploited on a regular basis, but they certainly are the worst when they co-exist. We’ve also seen abuse of API business logic outside of the OWASP categories, so it’s important to take a broader view of the threat landscape beyond just the OWASP-defined threats.

    Address API security challenges for operational technology

    So what can you do? You can do the same with your web application’s API. It’s important to understand the instrumentation and what you have. HMIs can be instrumented to review transactions, data collection, issue alerts, and enforce anomalies.

    If you’re interested in what the OT, SCADA, and ICS APIs are doing, instrumentation can help you see what transactions are going on, what data is in them, and what the transactions are doing. You can check if there is any problem. Add data points and set thresholds that should not be exceeded to keep your environment safe.

    Shadow capabilities must be revealed before they can be exploited by attackers. This includes APIs that help OT, SCADA, and ICS run smoothly. With hundreds of APIs in use in your organization, knowing what you don’t know is very important.

    I’ll help you. You can use API Spyder to find APIs in OT, SCADA, and ICS.

    Schedule a free API security assessment

    The API Security post in Operational Technology (OT) first appeared in Cequence Security.

    *** This is Cequence Security’s Security Bloggers Network syndicated blog written by Jason Kent. Read the original post: https://www.cequence.ai/blog/api-security/api-security-in-your-operational-technology-ot/



    Source link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    admin1
    • Website

    Related Posts

    Technology February 1, 2023

    Gorilla Technology Group Appoints Lawrence Ng as Head of Asia

    Technology February 1, 2023

    Tom Hanks, Robert Zemeckis’ new movie will use deepfake AI technology

    Technology February 1, 2023

    See the achievements of Iran’s space technology

    Technology February 1, 2023

    Advanced material market for nuclear fusion technology

    Technology February 1, 2023

    12 Information Technology Stocks to Move in Wednesday’s Intraday Session

    Technology February 1, 2023

    GoodRx illegally shared health data with tech giants to target ads, government claims

    Leave A Reply Cancel Reply

    Recent Comments

    No comments to show.

    Archives

    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • March 2022
    • February 2022
    • December 2021

    Categories

    • Crypto
    • Make money
    • News
    • Startup
    • Technology
    • Trending
    • Uncategorized
    Facebook Twitter Instagram Pinterest
    • Home
    • Contact us
    • DMCA
    • Privacy Policy
    • Sitemap
    © 2023 opzionebinaria. Designed by opzionebinaria.

    Type above and press Enter to search. Press Esc to cancel.